Back to Blog

Device Vulnerability – It Is More Than Just Ransomware

by Bruce Aboudara on July 2017 IT security is a complex and very broad topic that requires multiple elements of an organization working well together. At the systems level you must consider business, information, data and solution architectures. Next there are all the process designs that overlay these systems. Therefore just being able to collect, patch and provide device vulnerability data should not be considered protecting against a ransomware attack. That instead requires a l...

July 21, 2017

Gartner Report: Taming the Software Asset Management Tiger

Call it a Catch-22. Not only is Software Asset Management (SAM) more essential than ever -- it's also more complicated and distributed. Keeping current with obscure rules for version and edition upgrades is not enough -- you've also got to contend with the ever-looming software audit. The path forward? The SAM market is evolving, but you need to understand both buyer trends and market implications to minimize risks and optimize future costs. Download the Gartner Market Trends report, "Taming ...

July 26, 2016 Posts 1-2 of 2 | Page

This product has been added to your cart